Securing Hybrid Identity

Identity is the new security perimeter. Any breach in this perimeter can enable malicious users to gain access to your apps, your data, and your business operations. For organizations that rely on ...
"Add workstations to domain" user right

Know Your AD Vulnerability: CVE-2022-26923

On May 10, 2022, a vulnerability within Active Directory (AD) and Active Directory Certificate Services (AD CS) was disclosed and patched. This AD vulnerability can lead to privilege escalation. In default installations ...

Identity Attack Watch: July 2022

Cyberattacks targeting Active Directory are on the upswing, putting pressure on AD, identity, and security teams to monitor the constantly shifting AD-focused threat landscape. To help IT pros better understand and guard ...

Bolstering AD Password Policies

Presets Aren’t Enough  Let’s keep things real: passwords aren’t going anywhere. And with continued—and increasing—ransomware attacks and data breaches popping up everywhere, an organization’s password policies are crucial to its digital security ...

Hybrid Identity Protection with Dr. Nestori Synnimaa

| | Active Directory, General
“Every component in your on-prem environment that is part of a hybrid [Active Directory] configuration needs to be treated as a Tier 0 server, so they need to be protected as well ...
™

Purple Knight Introduces Azure AD Security Indicators

Purple Knight, the free Active Directory (AD) security assessment tool downloaded by 5,000-plus users, now enables you to identify and address security gaps across your hybrid identity environment. That’s right: The latest ...
Watching The Watchdog: Protecting Kerberos Authentication With Network Monitoring

A Diamond (Ticket) in the Ruff

[Editor’s note: This blog was co-authored by Andrew Schwartz at TrustedSec.] One day, while browsing YouTube, we came across a Black Hat 2015 presentation by Tal Be’ery and Michael Cherny. In their ...

Identity Attack Watch: June 2022

Cyberattacks targeting Active Directory are on the upswing, putting pressure on AD, identity, and security teams to monitor the constantly shifting AD-focused threat landscape. To help IT pros better understand and guard ...

Top Tips for Protecting Active Directory

Active Directory is one of the most important components of your network. Yet protecting Active Directory can be one of the most challenging tasks on your to-do list. The problem is that ...
Establish security boundaries in your on-prem AD and Azure environment

Establish security boundaries in your on-prem AD and Azure environment

Preventing escalation from initial access in your Active Directory (AD) environment to Domain Admins can feel impossible, especially after years of successful red team engagements finding new attack paths each time. While ...